{"id":"https://openalex.org/W4403056957","doi":"https://doi.org/10.1186/s42400-024-00224-w","title":"Discovering API usage specifications for security detection using two-stage code mining","display_name":"Discovering API usage specifications for security detection using two-stage code mining","publication_year":2024,"publication_date":"2024-10-03","ids":{"openalex":"https://openalex.org/W4403056957","doi":"https://doi.org/10.1186/s42400-024-00224-w"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00224-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00224-w","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-024-00224-w.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-024-00224-w.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053038831","display_name":"Zhongxu Yin","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhongxu Yin","raw_affiliation_strings":["Information Engineering University, Zhengzhou, 450001, China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, 450001, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109752616","display_name":"Yiran Song","orcid":"https://orcid.org/0009-0007-2353-2383"},"institutions":[{"id":"https://openalex.org/I4750791","display_name":"Henan Agricultural University","ror":"https://ror.org/04eq83d71","country_code":"CN","type":"education","lineage":["https://openalex.org/I4750791"]},{"id":"https://openalex.org/I7726996","display_name":"Henan University of Economic and Law","ror":"https://ror.org/000jtc944","country_code":"CN","type":"education","lineage":["https://openalex.org/I7726996"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiran Song","raw_affiliation_strings":["Henan University of Animal Husbandry Economy, Zhengzhou, 450046, China"],"affiliations":[{"raw_affiliation_string":"Henan University of Animal Husbandry Economy, Zhengzhou, 450046, China","institution_ids":["https://openalex.org/I4750791","https://openalex.org/I7726996"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107695942","display_name":"Guoxiao Zong","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoxiao Zong","raw_affiliation_strings":["Information Engineering University, Zhengzhou, 450001, China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, 450001, China","institution_ids":["https://openalex.org/I169689159"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053038831"],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26182711,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"7","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6749556064605713},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.538711428642273},{"id":"https://openalex.org/keywords/stage","display_name":"Stage (stratigraphy)","score":0.47256746888160706},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3513641357421875},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.13875031471252441},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.1285628080368042}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6749556064605713},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.538711428642273},{"id":"https://openalex.org/C146357865","wikidata":"https://www.wikidata.org/wiki/Q1123245","display_name":"Stage (stratigraphy)","level":2,"score":0.47256746888160706},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3513641357421875},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.13875031471252441},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.1285628080368042},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00224-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00224-w","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-024-00224-w.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:63a8e6575dc746ffb122dc05afae6ff4","is_oa":true,"landing_page_url":"https://doaj.org/article/63a8e6575dc746ffb122dc05afae6ff4","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 7, Iss 1, Pp 1-23 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00224-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00224-w","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-024-00224-w.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4403056957.pdf","grobid_xml":"https://content.openalex.org/works/W4403056957.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W159524162","https://openalex.org/W1457363419","https://openalex.org/W1517949462","https://openalex.org/W1987615754","https://openalex.org/W1992860894","https://openalex.org/W2028820179","https://openalex.org/W2071088932","https://openalex.org/W2090339428","https://openalex.org/W2162481448","https://openalex.org/W2242407529","https://openalex.org/W2278789863","https://openalex.org/W2320617691","https://openalex.org/W2339960010","https://openalex.org/W2375939852","https://openalex.org/W2464615420","https://openalex.org/W2496223032","https://openalex.org/W2509822438","https://openalex.org/W2758877401","https://openalex.org/W2791610814","https://openalex.org/W2899516694","https://openalex.org/W2901463908","https://openalex.org/W2941296598","https://openalex.org/W3107488247","https://openalex.org/W4232691406","https://openalex.org/W4239312229","https://openalex.org/W4248574992","https://openalex.org/W4286331399","https://openalex.org/W4384302819"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Abstract":[0],"An":[1],"application":[2],"programming":[3],"interface":[4],"(API)":[5],"usage":[6],"specification,":[7],"which":[8,27],"includes":[9],"the":[10,18,34,39,47,100,135,144,147,159,164,188,206,210,220,230],"conditions,":[11],"calling":[12],"sequences,":[13],"and":[14,36,63,103,131,163,233],"semantic":[15,56,69,104,155,167,211],"relationships":[16,49,105,156,168,212],"of":[17,38,50,99,138,183,222,235],"API,":[19],"is":[20,28,151],"important":[21],"for":[22,32,81,169,213],"verifying":[23],"its":[24],"correct":[25],"usage,":[26],"in":[29,114,229],"turn":[30],"critical":[31],"ensuring":[33],"security":[35],"availability":[37],"target":[40,112],"program.":[41],"However,":[42],"existing":[43,198],"techniques":[44],"either":[45],"mine":[46],"co-occurring":[48],"multiple":[51,82,170,214],"APIs":[52,171],"without":[53],"considering":[54],"their":[55],"relationships,":[57],"or":[58],"they":[59],"use":[60],"data":[61],"flow":[62,65],"control":[64],"information":[66],"to":[67,76,133],"extract":[68,134],"beliefs":[70],"on":[71,126,177],"API":[72,88,101,122,129,141,148,224],"pairs":[73],"but":[74,201],"difficult":[75],"incorporate":[77],"when":[78],"mining":[79,90,124],"specifications":[80,165,207],"APIs.":[83,107,215],"Hence,":[84],"we":[85],"propose":[86],"an":[87],"specification":[89],"approach":[91,109,191],"that":[92,187,219],"efficiently":[93],"extracts":[94],"a":[95,111],"relatively":[96],"complete":[97],"list":[98],"combinations":[102],"between":[106],"This":[108],"analyzes":[110],"program":[113],"two":[115],"stages.":[116],"The":[117,174],"first":[118],"stage":[119],"uses":[120],"frequent":[121,127,139],"set":[123,137],"based":[125],"common":[128],"identification":[130],"filtration":[132],"maximal":[136],"context-sensitive":[140],"sequences.":[142],"In":[143],"second":[145],"stage,":[146],"relationship":[149],"graph":[150],"constructed":[152],"using":[153],"three":[154],"extracted":[157],"from":[158],"symbolic":[160],"path":[161],"information,":[162],"containing":[166],"are":[172],"mined.":[173],"experimental":[175],"results":[176,196],"six":[178],"popular":[179],"open-source":[180],"code":[181],"bases":[182],"different":[184],"scales":[185],"show":[186],"proposed":[189],"two-stage":[190],"not":[192],"only":[193],"yields":[194],"better":[195],"than":[197],"typical":[199],"approaches,":[200],"also":[202],"can":[203,227],"effectively":[204],"discover":[205],"along":[208],"with":[209],"Instance":[216],"analysis":[217,221,232],"shows":[218],"security-related":[223],"call":[225],"violations":[226],"assist":[228],"cause":[231],"patch":[234],"software":[236],"vulnerabilities.":[237]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
